{"id":3716,"date":"2023-04-10T07:49:42","date_gmt":"2023-04-10T07:49:42","guid":{"rendered":"https:\/\/www.karenhanna.com\/qui-nous-recrutons\/bug-bounty-hunter\/"},"modified":"2023-08-03T06:28:16","modified_gmt":"2023-08-03T06:28:16","slug":"chasseur-de-bug-bounty","status":"publish","type":"page","link":"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/","title":{"rendered":"Chasseur de Bug Bounty"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3716\" class=\"elementor elementor-3716 elementor-3076\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cb69ef5 elementor-section-full_width elementor-section-stretched text-light elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"cb69ef5\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5eebb18\" data-id=\"5eebb18\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-468f1ec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"468f1ec\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c53e6d0\" data-id=\"c53e6d0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1dc7973 elementor-widget elementor-widget-heading\" data-id=\"1dc7973\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.5 - 14-03-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h3 class=\"elementor-heading-title elementor-size-default\">Chasseur de Bug Bounty<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc055a4 elementor-widget elementor-widget-spacer\" data-id=\"fc055a4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.5 - 14-03-2023 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4300dd elementor-widget elementor-widget-text-editor\" data-id=\"f4300dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.11.5 - 14-03-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Les Chasseurs de bug bounty <strong>sont des personnes qui connaissent les rouages de la cybers\u00e9curit\u00e9 et qui savent bien trouver les failles et les vuln\u00e9rabilit\u00e9s<\/strong>. Il existe diff\u00e9rentes plates-formes de primes de bogues qui leur permettent d&#8217;\u00eatre pay\u00e9s pour trouver des vuln\u00e9rabilit\u00e9s dans les applications et les logiciels.<\/p><p>La description de poste d&#8217;un Bug Bounty Hunter peut inclure les \u00e9l\u00e9ments suivants :<strong>\u00a0<\/strong><\/p><p><strong>Responsabilit\u00e9s :<\/strong><strong>\u00a0<\/strong><\/p><ul><li>Examinez les sous-domaines cibles, les sous-domaines des sous-domaines et les d\u00e9fauts.<\/li><li>Impl\u00e9menter des outils tels que Sublister, Aquatone\/HostileSubBruteForcer, Nikto, Dig, Nessus, etc.<\/li><li>Formulez des d\u00e9couvertes de vuln\u00e9rabilit\u00e9 avec des \u00e9tapes de preuve de concept reproductibles.<\/li><li>S&#8217;engager avec la communaut\u00e9 de la s\u00e9curit\u00e9 sur les tendances li\u00e9es aux vuln\u00e9rabilit\u00e9s courantes exploit\u00e9es de mani\u00e8re nouvelle ou innovante.<\/li><li>D\u00e9veloppez et am\u00e9liorez les processus et outils existants utilis\u00e9s pour la validation des vuln\u00e9rabilit\u00e9s.<\/li><li>Contribuer \u00e0 la cr\u00e9ation de signatures utilis\u00e9es dans les produits automatis\u00e9s de d\u00e9tection de vuln\u00e9rabilit\u00e9s.<\/li><li>Avoir l&#8217;opportunit\u00e9 de contribuer \u00e0 l&#8217;identification des vuln\u00e9rabilit\u00e9s dans les programmes.<\/li><li>La r\u00e9daction de rapports.<strong>\u00a0<\/strong><\/li><\/ul><p><strong>Les crit\u00e8res de s\u00e9lection :<\/strong><strong>\u00a0<\/strong><\/p><ul><li>Dipl\u00f4me en informatique ou en technologie de l&#8217;information ou dans un domaine connexe.<\/li><li>Ma\u00eetrise des langages d&#8217;application Web tels que HTML, JavaScript, PHP, SQL, Python, etc.<\/li><li>Familiarit\u00e9 avec les scripts intersites, la redirection ouverte et les r\u00e9f\u00e9rences directes d&#8217;objets non s\u00e9curis\u00e9es (IDOR) Familiarit\u00e9 avec les outils d&#8217;analyse de vuln\u00e9rabilit\u00e9 comme Veracode, Nikto, etc.<\/li><li>Test\u00e9 de vraies cibles sur des sites comme Facebook, Twitter, Spotify, etc.<\/li><li>Conna\u00eet le \u00ab\u00a0Dark\u00a0Web\u00a0\u00bb, le CSRF, le SSRF et les derni\u00e8res vuln\u00e9rabilit\u00e9s.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a04951a elementor-widget elementor-widget-spacer\" data-id=\"a04951a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-255577a elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"255577a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/www.karenhanna.com\/fr\/contact\/\" class=\"elementor-button-link elementor-button elementor-size-md\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Renseignez-vous maintenant<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"qrcprowrapper\" style=\"text-align:left;\" id=\"qrcwraaerfileds\"><div class=\"qrc_qrcode\" style=\"display:inline-block\" data-text=\"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/\"><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Chasseur de Bug Bounty Les Chasseurs de bug bounty sont des personnes qui connaissent les rouages de la cybers\u00e9curit\u00e9 et qui savent bien trouver les failles et les vuln\u00e9rabilit\u00e9s. Il existe diff\u00e9rentes plates-formes de primes de bogues qui leur permettent d&#8217;\u00eatre pay\u00e9s pour trouver des vuln\u00e9rabilit\u00e9s dans les applications et les logiciels. La description de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":3574,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-template\/crystal-template.php","meta":{"footnotes":""},"class_list":["post-3716","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Chasseur de Bug Bounty - Karen Hanna Executive Search<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chasseur de Bug Bounty - Karen Hanna Executive Search\" \/>\n<meta property=\"og:description\" content=\"Chasseur de Bug Bounty Les Chasseurs de bug bounty sont des personnes qui connaissent les rouages de la cybers\u00e9curit\u00e9 et qui savent bien trouver les failles et les vuln\u00e9rabilit\u00e9s. Il existe diff\u00e9rentes plates-formes de primes de bogues qui leur permettent d&#8217;\u00eatre pay\u00e9s pour trouver des vuln\u00e9rabilit\u00e9s dans les applications et les logiciels. La description de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/\" \/>\n<meta property=\"og:site_name\" content=\"Karen Hanna Executive Search\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/karenhannaexecutivesearch\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-03T06:28:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@karenhannaES\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/\",\"url\":\"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/\",\"name\":\"Chasseur de Bug Bounty - Karen Hanna Executive Search\",\"isPartOf\":{\"@id\":\"https:\/\/www.karenhanna.com\/#website\"},\"datePublished\":\"2023-04-10T07:49:42+00:00\",\"dateModified\":\"2023-08-03T06:28:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.karenhanna.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Qui Nous Recrutons\",\"item\":\"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Chasseur de Bug Bounty\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.karenhanna.com\/#website\",\"url\":\"https:\/\/www.karenhanna.com\/\",\"name\":\"Karen Hanna Executive Search\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.karenhanna.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.karenhanna.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.karenhanna.com\/#organization\",\"name\":\"Karen Hanna Executive Search\",\"url\":\"https:\/\/www.karenhanna.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.karenhanna.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.karenhanna.com\/wp-content\/uploads\/2023\/04\/karen-hanna-logo.png\",\"contentUrl\":\"https:\/\/www.karenhanna.com\/wp-content\/uploads\/2023\/04\/karen-hanna-logo.png\",\"width\":500,\"height\":500,\"caption\":\"Karen Hanna Executive Search\"},\"image\":{\"@id\":\"https:\/\/www.karenhanna.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/karenhannaexecutivesearch\",\"https:\/\/twitter.com\/karenhannaES\",\"https:\/\/www.linkedin.com\/company\/karen-hanna-recherche-de-cadres-executive-search\/about\/\",\"https:\/\/www.instagram.com\/karenhannaexecutivesearch\/\",\"https:\/\/www.youtube.com\/@KarenHannaExecutiveSearch\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Chasseur de Bug Bounty - Karen Hanna Executive Search","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/","og_locale":"fr_FR","og_type":"article","og_title":"Chasseur de Bug Bounty - Karen Hanna Executive Search","og_description":"Chasseur de Bug Bounty Les Chasseurs de bug bounty sont des personnes qui connaissent les rouages de la cybers\u00e9curit\u00e9 et qui savent bien trouver les failles et les vuln\u00e9rabilit\u00e9s. Il existe diff\u00e9rentes plates-formes de primes de bogues qui leur permettent d&#8217;\u00eatre pay\u00e9s pour trouver des vuln\u00e9rabilit\u00e9s dans les applications et les logiciels. La description de [&hellip;]","og_url":"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/","og_site_name":"Karen Hanna Executive Search","article_publisher":"https:\/\/www.facebook.com\/karenhannaexecutivesearch","article_modified_time":"2023-08-03T06:28:16+00:00","twitter_card":"summary_large_image","twitter_site":"@karenhannaES","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/","url":"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/","name":"Chasseur de Bug Bounty - Karen Hanna Executive Search","isPartOf":{"@id":"https:\/\/www.karenhanna.com\/#website"},"datePublished":"2023-04-10T07:49:42+00:00","dateModified":"2023-08-03T06:28:16+00:00","breadcrumb":{"@id":"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/chasseur-de-bug-bounty\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.karenhanna.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Qui Nous Recrutons","item":"https:\/\/www.karenhanna.com\/fr\/qui-nous-recrutons\/"},{"@type":"ListItem","position":3,"name":"Chasseur de Bug Bounty"}]},{"@type":"WebSite","@id":"https:\/\/www.karenhanna.com\/#website","url":"https:\/\/www.karenhanna.com\/","name":"Karen Hanna Executive Search","description":"","publisher":{"@id":"https:\/\/www.karenhanna.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.karenhanna.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.karenhanna.com\/#organization","name":"Karen Hanna Executive Search","url":"https:\/\/www.karenhanna.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.karenhanna.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.karenhanna.com\/wp-content\/uploads\/2023\/04\/karen-hanna-logo.png","contentUrl":"https:\/\/www.karenhanna.com\/wp-content\/uploads\/2023\/04\/karen-hanna-logo.png","width":500,"height":500,"caption":"Karen Hanna Executive Search"},"image":{"@id":"https:\/\/www.karenhanna.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/karenhannaexecutivesearch","https:\/\/twitter.com\/karenhannaES","https:\/\/www.linkedin.com\/company\/karen-hanna-recherche-de-cadres-executive-search\/about\/","https:\/\/www.instagram.com\/karenhannaexecutivesearch\/","https:\/\/www.youtube.com\/@KarenHannaExecutiveSearch"]}]}},"_links":{"self":[{"href":"https:\/\/www.karenhanna.com\/fr\/wp-json\/wp\/v2\/pages\/3716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.karenhanna.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.karenhanna.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.karenhanna.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.karenhanna.com\/fr\/wp-json\/wp\/v2\/comments?post=3716"}],"version-history":[{"count":0,"href":"https:\/\/www.karenhanna.com\/fr\/wp-json\/wp\/v2\/pages\/3716\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.karenhanna.com\/fr\/wp-json\/wp\/v2\/pages\/3574"}],"wp:attachment":[{"href":"https:\/\/www.karenhanna.com\/fr\/wp-json\/wp\/v2\/media?parent=3716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}